Latest projects

The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...

The project Emerging Technologies and Global Security is part of the PIR Center eponymous program and aimed at exploring the potential for cooperation...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

The 2015 NPT Review Conference, which failed to approve a Final Document, has put into stark relief the key challenges facing the nuclear nonproliferation regime. These challenges fall under four main categories: ongoing difficulties with the implementation and universalization of the treaty, distur...

A Policy Memo

Executive Summary

Cybersecurity challenges have become one of the key concerns for the operators across all critical infrastructure (CI) sectors. Rapid progress in offensive cyber capabilities and upsurge of the number of CI cybersecurity incidents demand urgent reaction from operators...

On 16-17 March the Strategic Studies Network from Near East South Asia (NESA) Center of the US National Defense University convened a task force to develop a draft agreement on the Iranian nuclear program. The group – consisting of P5+1, EU, GCC (Gulf Countries Council), Israeli, and Turkish experts...

The study analyses lessons learned from the application of various international mechanisms to counter the proliferation of weapons of mass destruction (WMD) and strengthen nuclear security. The study also outlines several proposals for improving the effectiveness of these mechanisms.

Full text

Identification of internet users, owners of internet content and technical infrastructure, as well as persons providing various services via the internet, has undoubtedly become one of the hottest topics of discussions between representatives of government agencies and the expert community. As far a...

REPORT

Recently it has become known that two prime suspects in committing the Boston Marathon bombings are two brother who had been identified as ethnic Chechens. On April 22, 2013 New York Times published an article[i] which noted that until a few days ago few Americans even knew what and where Che...

loading